Automated discovery of mimicry attacks

被引:0
|
作者
Giffin, Jonathon T. [1 ]
Jha, Somesh [1 ]
Miller, Barton P. [1 ]
机构
[1] Univ Wisconsin, Dept Comp Sci, Madison, WI 53706 USA
关键词
IDS evaluation; model checking; attacks; model-based anomaly detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Model-based anomaly detection systems restrict program execution by a predefined model of allowed system call sequences. These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model. Our work helps to automate the discovery of such attacks. We start with two models: a program model of the application's system call behavior and a model of security-critical operating system state. Given unsafe OS state configurations that describe the goals of an attack, we then find system call sequences allowed as valid execution by the program model that produce the unsafe configurations. Our experiments show that we can automatically find attack sequences in models of programs such as wu-ftpd and passwd that previously have only been discovered manually. When undetected attacks are present, we frequently find the sequences with less than 2 seconds of computation.
引用
收藏
页码:41 / 60
页数:20
相关论文
共 50 条
  • [1] Automated Discovery of Adaptive Attacks on Adversarial Defenses
    Yao, Chengyuan
    Bielik, Pavol
    Tsankov, Petar
    Vechev, Martin
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [2] Mimicry Attacks on Smartphone Keystroke Authentication
    Khan, Hassan
    Hengartner, Urs
    Vogel, Daniel
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020, 23 (01)
  • [3] Automated Discovery of Java']JavaScript Code Injection Attacks in PHP Web Applications
    Gupta, Shashank
    Gupta, B. B.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 82 - 87
  • [4] Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets
    Dreier, Jannik
    Lafourcade, Pascal
    Mahmoud, Dhekra
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3135 - 3150
  • [5] Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
    Cheval, Vincent
    Cremers, Cas
    Dax, Alexander
    Hirschi, Lucca
    Jacomme, Charlie
    Kremer, Steve
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5899 - 5916
  • [6] Chemical Space Mimicry for Drug Discovery
    Yuan, William
    Jiang, Dadi
    Nambiar, Dhanya K.
    Liew, Lydia P.
    Hay, Michael P.
    Bloomstein, Joshua
    Lu, Peter
    Turner, Brandon
    Le, Quynh-Thu
    Tibshirani, Robert
    Khatri, Purvesh
    Moloney, Mark G.
    Koong, Albert C.
    JOURNAL OF CHEMICAL INFORMATION AND MODELING, 2017, 57 (04) : 875 - 882
  • [7] Automating mimicry attacks using static binary analysis
    Kruegel, C
    Kirda, E
    Mutz, D
    Robertson, W
    Vigna, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 161 - 176
  • [8] Mitigating Mimicry Attacks Against the Session Initiation Protocol
    Marchal, Samuel
    Mehta, Anil
    Gurbani, Vijay K.
    State, Radu
    Ho, Tin Kam
    Sancier-Barbosa, Flavia
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (03): : 467 - 482
  • [9] Identifying Statistical Mimicry Attacks in Distributed Spectrum Sensing
    Laghate, Mihir
    Huang, Chu-Hsiang
    Yu, Chung-Kai
    Dolecek, Lara
    Cabric, Danijela
    2013 ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2013, : 1478 - 1482
  • [10] Voice Mimicry Attacks Assisted by Automatic Speaker Verification
    Vestman, Ville
    Kinnunen, Tomi
    Hautamaki, Rosa Gonzalez
    Sahidullah, Md
    COMPUTER SPEECH AND LANGUAGE, 2020, 59 : 36 - 54